Competitive Information Diffusion Model in Social Network with Negative Information Propagation

  • Hong T. Tu
  • Khu P. Nguyen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10751)


Social networks can be used to exchange effectively information among people. But some networks also became the channels for spreading of information competing against to the information being diffused in network. In fact, when people adopted a positively recommend then one may have a high probability to refuse the recommend with a presence of a reasonable negative comment. Such exchanges make modeling information diffusion becomes more difficult. There are no much previous models have studied the spreading of positive and negative information flows simultaneously. In this paper, it is dealt with a proposed model for negative information diffusion in competition against a positive information flow. This problem is referred to the competitive information diffusion model or CID for short. In consideration of mechanism and realization the model, experimental case study shows some feasible contribution of the CID model.


Social networks Competitive information diffusion Negative opinions System of linear differential equations Matrix exponential function 


  1. 1.
    Krishna Kumar, K.P., Geethakumari, G.: Detecting misinformation in online social networks using cognitive psychology. Hum.-Cent. Comput. Inf. Sci.: Springer Open J. 4: 14 (2014).
  2. 2.
    Zhang, H., Alim, M.A., Thai, M.T., Nguyen, H.T.: Monitor placement to timely detect misinformation in online social networks. In: 2015 IEEE International Conference on Communications - ICC, pp. 1152–1157 (2015)Google Scholar
  3. 3.
    Amoruso, M., Anello, D., Auletta, V., Ferraioli, D.: Contrasting the spread of misinformation in online social networks. In: Proceedings of 16th International Conference on Autonomous Agents and Multi-agent Systems, São Paulo, Brazil, pp. 1323–1331 (2017)Google Scholar
  4. 4.
    Ma, H., Yang, H., Lyu, M.R., King, I.: Mining social networks using heat diffusion processes for marketing candidate selection. In: CIKM (2008)Google Scholar
  5. 5.
    Castillo, C., Mendoza, M., Poblete, B.: Information credibility on Twitter. In: Proceedings of 20th International Conference on WWW, pp. 675–684. ACM, Hyderabad (2011)Google Scholar
  6. 6.
    Nguyen, K.P., Tu, H.T.: Differential information diffusion in social networks. In: Asian Conference on Intelligent Information and Database Systems – ACIIDS 2018, Dong Hoi, Vietnam. Springer, Heidelberg, 19–21 March 2018 (accepted)Google Scholar
  7. 7.
    Guha, R.V., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of ACM WWW Conference, pp. 403–412 (2004)Google Scholar
  8. 8.
    Carnes, T., Nagarajan, C., Wild, S.M., van Zuylen, A.: Maximizing influence in a competitive social network: a follower’s perspective. In: ICEC 2007. ACM 978-1-59593-700-1/07/0008, Minneapolis (2007)Google Scholar
  9. 9.
    Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: 9th ACM SIGKDD, KDD 2003, New York, USA, pp. 137–146 (2003)Google Scholar
  10. 10.
    Chen, W., et al.: Influence maximization in social networks when negative opinions may emerge and propagate, MSR-TR-2010-137. In: Proceedings of SIAM International Conference on SDM (2011)Google Scholar
  11. 11.
    Alon, N., Feldman, M., Procaccia, A.D., Tennenholtz, M.: A note on competitive diffusion through social networks. Inf. Process. Lett. 110, 221–225 (2010). ElsevierMathSciNetCrossRefzbMATHGoogle Scholar
  12. 12.
    Sun, Q., Yao, Z.: Evolutionary game analysis of competitive information dissemination on social networks: an agent-based computational approach. Math. Probl. Eng. (2015). Article ID 679726, Hindawi Publ. CorporationGoogle Scholar
  13. 13.
    Rozin, P., Royzman, E.B.: Negativity bias, negativity dominance, and contagion. Pers. Soc. Psychol. Rev. 5(4), 296–320 (2001)CrossRefGoogle Scholar
  14. 14.
    Tu, H.T., Phan, T.T., Nguyen, K.P.: An adaptive latent semantic analysis for text mining. In: IEEE International Conference on: System Science and Engineering - ICSSE 2017. IEEE Xplore, HCM City (2017)Google Scholar
  15. 15.
    Tu, H.T., Nguyen, K.P.: Kernel-based similarity and discovering documents of similar interests. In: 13th IEEE International Conference on: Natural Computation, Fuzzy Systems and Knowledge Discovery - ICNC-FSKD 2017, Guilin, China (2017)Google Scholar
  16. 16.
    Hu, G.-D., Liu, M.: The weighted logarithmic matrix norm and bounds of the matrix exponential. Linear Algebra Appl. 390, 145–154 (2004). ElsevierMathSciNetCrossRefzbMATHGoogle Scholar
  17. 17.
    Jarlebring, E.: Methods for Lyapunov equations. Lecture Notes on Linear Algebra, KTH Report, Royal Institute of Technology, 10044 Stockholm, Sweden, pp. 03–06 (2017)Google Scholar
  18. 18.
    Deerwester, S., Dumais, S.T., Furnas, G.W., Landauer, T.K., Harshman, R.: Indexing by latent semantic analysis. J. Am. Soc. Inf. Sci. 4 (1990)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.HCMC University of Technology and EducationThu Duc, Ho Chi Minh CityVietnam
  2. 2.University of Information Technology, VNU-HCMThu Duc, Ho Chi Minh CityVietnam

Personalised recommendations